{"title":"评价加密算法的安全强度","authors":"G. Marinakis","doi":"10.47260/jamb/1213","DOIUrl":null,"url":null,"abstract":"Abstract\n\nIn this study, we propose a method in order to estimate the strength of a cryptographic algorithm. The method combines the evaluation of the cryptographic key length and the evaluation of the success rate of the randomness tests in the algorithm output samples. In the first step, the algorithm is classified into one of four general categories, according to its key size, taking into account the current computer power which a cryptanalyst can use for exhaustive key search. In the second step, we examine the success rate of the tests on the output samples. For this, the maximum accepted number of the rejected samples is calculated, taking as parameters the total number of samples (which depends from the selected sampling error) and the desired significance level and confidence interval for the success rate of the tests. If the rejected samples do not exceed the maximum number, the algorithm is considered as “random” and it is rated in the initial strength category due to its key size. If the rejected samples exceed the maximum number, the algorithm is submitted to further tests under certain conditions.\n\nKeywords: Cryptography, Data encryption, Communication security, Computer security, Data security, Information security.","PeriodicalId":254947,"journal":{"name":"Journal of Applied Mathematics & Bioinformatics","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Rating the Security Strength of Cryptographic Algorithms\",\"authors\":\"G. Marinakis\",\"doi\":\"10.47260/jamb/1213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract\\n\\nIn this study, we propose a method in order to estimate the strength of a cryptographic algorithm. The method combines the evaluation of the cryptographic key length and the evaluation of the success rate of the randomness tests in the algorithm output samples. In the first step, the algorithm is classified into one of four general categories, according to its key size, taking into account the current computer power which a cryptanalyst can use for exhaustive key search. In the second step, we examine the success rate of the tests on the output samples. For this, the maximum accepted number of the rejected samples is calculated, taking as parameters the total number of samples (which depends from the selected sampling error) and the desired significance level and confidence interval for the success rate of the tests. If the rejected samples do not exceed the maximum number, the algorithm is considered as “random” and it is rated in the initial strength category due to its key size. If the rejected samples exceed the maximum number, the algorithm is submitted to further tests under certain conditions.\\n\\nKeywords: Cryptography, Data encryption, Communication security, Computer security, Data security, Information security.\",\"PeriodicalId\":254947,\"journal\":{\"name\":\"Journal of Applied Mathematics & Bioinformatics\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Applied Mathematics & Bioinformatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47260/jamb/1213\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Mathematics & Bioinformatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47260/jamb/1213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Rating the Security Strength of Cryptographic Algorithms
Abstract
In this study, we propose a method in order to estimate the strength of a cryptographic algorithm. The method combines the evaluation of the cryptographic key length and the evaluation of the success rate of the randomness tests in the algorithm output samples. In the first step, the algorithm is classified into one of four general categories, according to its key size, taking into account the current computer power which a cryptanalyst can use for exhaustive key search. In the second step, we examine the success rate of the tests on the output samples. For this, the maximum accepted number of the rejected samples is calculated, taking as parameters the total number of samples (which depends from the selected sampling error) and the desired significance level and confidence interval for the success rate of the tests. If the rejected samples do not exceed the maximum number, the algorithm is considered as “random” and it is rated in the initial strength category due to its key size. If the rejected samples exceed the maximum number, the algorithm is submitted to further tests under certain conditions.
Keywords: Cryptography, Data encryption, Communication security, Computer security, Data security, Information security.